Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7673 articles
Browse latest View live

Change gpu retain temp

$
0
0
I tried: --gpu-temp-retain=70

also: -u --gpu-temp-retain=70

what am I doing wrong

using --force

$
0
0
My radeon 7970 is saying I need to use force to continue because of my driver whats the latest working one?

Limit cudaHashcat's GPU usage?

$
0
0
Hello everyone! I use cudaHashcat with my laptop's Nvidia GT 750M graphics card to crack WPA and WPA2 passwords. And that's fine and dandy for easy-to-crack passwords, for example passwords that take only an hour or two, but not over that. Because I do indeed have a laptop, it's obviously bad to expose its components to that extreme of heat that they get to because my GPU is running at full force. So, sadly, I cannot leave my laptop running overnight else it may overheat and cause serious and permanent damage. So what I'm wondering is, can I limit Hashcat's GPU usage to something like 50%? That way I could leave my laptop running overnight while I sleep without the fear of it setting on fire and burning everything in my house to ash... Hopefully one of you guys or gals can help, thanks in advanced!


EDIT: Adding the -n 1 option lowers my GPU usage to about 91%, but my laptop still rules at 61+ degrees. I'd like to lower it to around 85% to keep it from going over 60. Is this possible? Thanks!

hash_mode > 99999

$
0
0
I am trying to unhash <redacted>. Googleing it, I find out that it must be a SHA256 hash because it is a 64 character hash. I try to use hashcat to solve it. I know that what I get back will be "A**BaC*XsMRT***7" where * indicates an unknown value. I get an error message "hash_mode > 99999". Any help?

Not going at full speed?

$
0
0
These are my logs

Session.Name...: oclHashcat
Status.........: Running
Input.Mode.....: Mask (?1?2?2?2?2?2) [6]
Hash.Target....: File (weak.txt)
Hash.Type......: vBulletin > v3.8.5
Time.Started...: Mon Apr 13 06:50:51 2015 (1 hour, 58 mins)
Time.Estimated.: Mon Apr 13 10:31:46 2015 (1 hour, 36 mins)
Speed.GPU.#1...: 334.5 kH/s
Recovered......: 1213/4857 (24.97%) Digests, 1213/4857 (24.97%) Salts


why is it showing 334.5 kh/s when I have the rem radeon 7970?

Cisco IOS MD5 BruteForce Mask

$
0
0
I am new to hashcat/cudahashcat. I'm a network engineer trying to recover some passwords from some old configs.

I have a standard Cisco IOS salted md5 hash. I found some rainbow tables but they did not find a match. I would like to try to brute force this but figuring out the mask has me questioning myself.

Could someone provide the correct mask to bruteforce a cisco ios md5?

Thanks

No output file

$
0
0
I'm still learning about hashcat and I'm running it on windows. But for some reason, no matter what I do, a .txt file is not created while running hashcat. I am bruteforcing a list of 400k md5 hashes so it shouldn't take long at all with my card. But this is what I'm using:

Code:
cudaHashCat64 -a 3 -m 0 orangehashes2.txt -i -1 ?a
?1?1?1?1?1?1?1?1 -o crackedhashes.txt --outfile-format=2

I've tried disable potfile as well and still to no avail a text document is not being created. But when I start the process over again, it seems to recover the hashes that have already been cracked, because instead of it saying:

Progress: 0/420402 it says:

Progress: 283898/420402

Code:
Session.Name...: cudaHashcat
Status.........: Aborted
Input.Mode.....: Mask (?1?2?2?2?2?2?2?3) [8]
Hash.Target....: File (orangehashes2.txt)
Hash.Type......: MD5
Time.Started...: Tue Apr 14 10:26:26 2015 (1 min, 59 secs>
Time.Estimated.: Tue Apr 14 11:22:19 2015 (52 mins, 29 secs>
Speed.GPU.#1...:  2585.9 MH/s
Recovered......: 283898/420402 (67.53%) Digests, 0/1 <0.00%> Salts
Progress.......: 309803876352/8478567198720 <3.65%>
Skipped........: 0/309803876352 (0.00%)
Rejected.......: 0/309803876352 (0.00%)
Restore.Point..: 2752512/68864256 (4.00%)
HWMon.GPU.#1...:  0% Util, 54c Temp, N/A Fan

I ran this for 8 hours last night and no text file was created.

What is wrong

$
0
0
Hi everybody, I am new here,

I am trying to mask attack

oclHashcat64.exe --force -t 32 -a 3 -m 1400 --custom-charset1=?l?d?u SHA-256.hash ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
pause

Output:

oclHashcat v1.35 starting...

Device #1: Turks, 2048MB, 800Mhz, 6MCU
Device #2: Pitcairn, 2048MB, 1000Mhz, 16MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes, 0/1 rotates
Applicable Optimizers:
* Zero-Byte
* Precompute-Init
* Precompute-Merkle-Demgard
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force
* Scalar-Mode
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Kernel ./kernels/4098/m01400_a3.Turks_1642.5_1642.5 (VM)_1426989084.kernel (438636 bytes)

Device #1: Kernel ./kernels/4098/markov_be_v1.Turks_1642.5_1642.5 (VM)_1426989084.kernel (42436 byte
s)
Device #2: Kernel ./kernels/4098/m01400_a3.Pitcairn_1642.5_1642.5 (VM)_1426989084.kernel (265048 byt
es)
Device #2: Kernel ./kernels/4098/markov_be_v1.Pitcairn_1642.5_1642.5 (VM)_1426989084.kernel (35128 b
ytes)


ATTENTION!
The wordlist or mask you are using is too small.
Therefore, oclHashcat is unable to utilize the full parallelization power of your GPU(s).
The cracking speed will drop.
Workaround: https://hashcat.net/forum/thread-4161.html


INFO: approaching final keyspace, workload adjusted


Session.Name...: oclHashcat
Status.........: Exhausted
Input.Mode.....: Mask (?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1) [16]
Hash.Target....: afe884d8cffd049bb8bcab08a3fbc0501c64711aee071e3ef9b28bd6d1211edc
Hash.Type......: SHA256
Time.Started...: 0 secs
Time.Estimated.: 0 secs
Speed.GPU.#1...: 0 H/s
Speed.GPU.#2...: 0 H/s
Speed.GPU.#*...: 0 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 0/0 (100.00%)
Skipped........: 0/0 (100.00%)
Rejected.......: 0/0 (100.00%)
Restore point..: 0/0 (100.00%)
HWMon.GPU.#1...: 12% Util, 46c Temp, 44% Fan
HWMon.GPU.#2...: 0% Util, 42c Temp, 55% Fan

Started: Tue Apr 14 19:34:23 2015
Stopped: Tue Apr 14 19:34:26 2015

D:\oclHashcat-1.35>pause
Press any key to continue . . .


Thanks.

Special characters in mask

$
0
0
Hi,

How we can write correct mask in this situation

example pass type is

ab c, . d

da d, . b

....

I am trying this mask

?l?l ?l, . ?l

is not work

Thank you.

office excel 2010 hash

$
0
0
Can anyone know how to crack the office excel 2010 hash..i used office2john.py to get the below hash..

but not sure how to crack..

please let me know..

new_quote.xlsx:$office$*2010*100000*128*16*xxxxxxxxxxxxxxxxxxxxxxxxxxx57*9800459​c8e031ca9789ff169e2f90554*a8ed95f2b0969ab7afe265c9ab7aefeafaf786088cec590bc368b5​61b55eb5d4

Rule new

$
0
0
Hello, help learn how to write rules for delirium. I want to write a rule that:
1) the presence of all characters : ?l
2) the presence of all characters : ?d
3) the presence of all the characters : ?u , but to the symbol of this range was iterating represented by only one in every word: loOser45 or friEnd6655 or saimOn
Specifies the length of the password is also arbitrary, from 1 to 9, for example.
Thanks in advance.

dict attack with GPU

$
0
0
i try to crack a truecrypt file that i know the password is a 3 word from a big list (16000 word (dict.dict)) and i have a 3 GPU

i write a command:
cudahashcat64.exe -a 7 -m 6211 c:\file.tc ?a?a?a dict.dict

the hachcat start and the program run only in 1 GPU. and the other GPU dont work.
how can i run in the other GPU to?

Hashcat Starts and Stops Immediately

$
0
0
C:\Cuda>cuda -m 0 -a 0 -o C:\cuda\b.txt C:\cuda\a.txt C:\cuda\data
cudaHashcat v1.35 starting...

Device #1: GeForce GTX 860M, 2048MB, 1019Mhz, 5MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes, 0/1 rotates
Rules: 1
Applicable Optimizers:
* Zero-Byte
* Precompute-Init
* Precompute-Merkle-Demgard
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Scalar-Mode
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Kernel ./kernels/4318/m00000_a0.sm_50.64.ptx

INFO: removed 1 hash found in pot file


Session.Name...: cudaHashcat
Status.........: Cracked
Input.Mode.....: File (C:\cuda\data/AT_T.dic)
Hash.Target....: <redacted>
Hash.Type......: MD5
Time.Started...: 0 secs
Speed.GPU.#1...: 0 H/s
Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.......: 0/0 (100.00%)
Skipped........: 0/0 (100.00%)
Rejected.......: 0/0 (100.00%)
Restore point..: 0/0 (100.00%)
HWMon.GPU.#1...: 0% Util, 43c Temp, N/A Fan

Started: Wed Apr 15 15:06:50 2015
Stopped: Wed Apr 15 15:06:52 2015

C:\Cuda>

Please Help

Fail to extract Lotus Domino 8 hash file correctly

$
0
0
Dear All,
Sorry for my English is not good, my question is I have a Notes ID file from Domino 8.5 and use "lotus2john.py" to extract the hash key to separate file domino8hash.out , but I see the output hash file pattern is just like Domino 5 and I compare the hash key by hash example from Wiki page is not similar and just like Domino 5 format, then I try to run the command "oclHashcat64.bin --hash-type 9100 --attack-mode 3 /tmp/domino8hash.out ?d?d?d?d?d?d?d" and get the fail message WARNING: hash '/tmp/domino8hash.out': Line-length exception ERROR: No hashes loaded but I try to use the example hash for Domino 8 was no this problem, anyone can tell me how to extract the correct hash from Domino8 ID file or the lotus2john.py utility was unable to handle the Domino8 ID format? Please help me.

Thanks

When bruteforcing

$
0
0
When you bruteforce is it suppose to be MH, or is it bottlenecking because when I use dictionarys it goes H/s

Newbie question - Recover associated hex string of SHA1 hash

$
0
0
I'm a newbie and I've a question about using oclHashcat.
I don't know whether it is suitable for what I want to achieve

I've a SHA1 hash value and want to find the associated hexadecimal string.

Example:
The hex string to retrieve is: AB0EFFB8
The SHA1 value is: 054b71ba03578aa5b476b3d3af663b3180cecc59

Is it possible to use oclHashcat and if so, what's the best command line to use.
(Should hash value lower or uppercase)

Any help is greatly appreciated.

Truecrypt keyfile support ?

$
0
0
Hi when will Truecrypt keyfile support be implemented in to oclHashcat as it would be useful in some cases ? If you have a Truecrypt container which requires a keyfile and you have that keyfile but need the password forced what options are there apart from otfBrutus(which is very slow in comparison) in cracking containers for Amd gpu's?

Regards

How to recover Joomla 1.5 password?

$
0
0
Hi,

I have Joomla hashes, and cracking with my laptop gpu - NVIDIA GeForce GT750M

the script I have come up with is this

cudaHashcat64 -a 3 -m 11 --increment --increment-min=4 --increment-max=10 -o crack/cracked.txt hashes.txt -1 ?l?d ?1?1?1?1?1?1?1?1?1?1

I believe this should attempt to bruteforce any password containing either letters or digits with length of 4 - 10

Is that correct?



Output looks like this


Session.Name...: cudaHashcat
Status.........: Running
Input.Mode.....: Mask (?1?1?1?1?1?1?1) [7]
Hash.Target....: File (hashes.txt)
Hash.Type......: Joomla < 2.5.18
Time.Started...: Fri Apr 17 11:09:35 2015 (15 mins, 37 secs)
Time.Estimated.: Fri Apr 17 11:39:31 2015 (13 mins, 27 secs)
Speed.GPU.#1...: 44694.3 kH/s
Recovered......: 0/13 (0.00%) Digests, 0/13 (0.00%) Salts
Progress.......: 547352477696/1018734133248 (53.73%)
Skipped........: 0/547352477696 (0.00%)
Rejected.......: 0/547352477696 (0.00%)
Restore.Point..: 851968/1679616 (50.72%)
HWMon.GPU.#1...: 97% Util, 84c Temp, N/A Fan

[s]tatus [p]ause [r]esume [b]ypass [q]uit =>

I double checked my syntax so im pretty sure im doing it right, its just the "[7]" after mask that makes me wonder if its only bruteforcing a length of 7 ...

and also because I havent cracked anything yet idk if its working

EDIT the mask changed to 8 now so im guessing it is working correctly. If i dont crack anything then I guess I can try adding specials to the bruteforce. So is Joomla is a very weak hash? Seems easy if 10 character passwords can be bruteforced with a little laptop GPU

Odd Bruteforce Issue

$
0
0
So I just put together a Tyan machine with 8 980s, and I've been running a big domain we had captured in a previous engagement as a test.

With the 8 cards we can brute force 7-character NTLM pretty quickly, so before I ran any wordlists and rules, I cranked out the following:

cudaHashcat64.bin -a 3 -m 1000 -i /path/to/hash-file.txt ?a?a?a?a?a?a?a

That spit out a whole bunch of plain 1 to 7 characters, easy enough.

When I moved on to using wordlists though, I noticed a large number of 7 character passwords getting spit out as well. I know its removing the previously cracked hashes - I get the message at the beginning of the crack that x number of hashes were found in the cudaHashcat.pot file (am I wrong in thinking that it removes those?).

I went back and tried the following just in case:

cudaHashcat64.bin -a 3 -m 1000 -i --markov-disable -1 ?u?l?d?s /path/to/hash-file.txt ?1?1?1?1?1?1?1

That spit out even more plains. I went back and used another wordlists based attack with a different rules file, and again, more 7 character plains were returned.

Now, I'll admit that this domain we're running is a bit screwy, so I suppose there could be spaces or something at the end of what I think are 7 character passwords - I haven't looked at that quite yet. But it seems right now like something odd is going on - every time I run a 7 character brute, it says that it finds x number of hashes in the pot file, and then proceeds to crack more 7 character passwords.

Any ideas? Am I missing something in the command? I don't think I am because the recovered number keeps increasing every time I run the brute force, so I'm pretty sure its correctly removing the previous cracked hashes from each run.

As reference, the domain I'm going after has 389,093 unique NTLM hashes. I have driver 346.47, and cudaHashcat-1.35.

Ordering Dictionarys

$
0
0
Ok so I just have one folder with all my wordlists in it which means slower cracking, so how do you have your dictionarys organized?

I just now seperated them from large wordlists to small ones but just wanted your opinion on how you have yours set up.
Viewing all 7673 articles
Browse latest View live